/systemd/src/libsystemd/sd-bus/ |
H A D | bus-convenience.c | 555 _public_ int sd_bus_query_sender_privilege(sd_bus_message *call, int capability) { argument 569 if (capability >= 0) { 585 r = sd_bus_creds_has_effective_cap(creds, capability); 596 /* Now, check the UID, but only if the capability check wasn't 599 if (our_uid != 0 || !know_caps || capability < 0) {
|
H A D | bus-creds.h | 66 uint32_t *capability; member in struct:sd_bus_creds
|
H A D | bus-dump.c | 26 #include "capability-util.h" 289 int (*has)(sd_bus_creds *c, int capability)) { 284 dump_capabilities( sd_bus_creds *c, FILE *f, const char *name, bool terse, int (*has)(sd_bus_creds *c, int capability)) argument
|
H A D | bus-creds.c | 20 #include <linux/capability.h> 29 #include "capability-util.h" 110 free(c->capability); 671 static int has_cap(sd_bus_creds *c, unsigned offset, int capability) { argument 675 assert(capability >= 0); 676 assert(c->capability); 678 if ((unsigned) capability > cap_last_cap()) 683 return !!(c->capability[offset * sz + CAP_TO_INDEX(capability)] & CAP_TO_MASK(capability)); 686 sd_bus_creds_has_effective_cap(sd_bus_creds *c, int capability) argument 696 sd_bus_creds_has_permitted_cap(sd_bus_creds *c, int capability) argument 706 sd_bus_creds_has_inheritable_cap(sd_bus_creds *c, int capability) argument 716 sd_bus_creds_has_bounding_cap(sd_bus_creds *c, int capability) argument [all...] |
/systemd/src/nspawn/ |
H A D | nspawn-settings.h | 59 uint64_t capability; member in struct:Settings
|
H A D | nspawn.c | 53 #include "capability-util.h" 232 " --capability=CAP In addition to the default, retain specified\n" 233 " capability\n" 234 " --drop-capability=CAP Drop the specified capability from the default set\n" 365 { "capability", required_argument, NULL, ARG_CAPABILITY }, 366 { "drop-capability", required_argument, NULL, ARG_DROP_CAPABILITY }, 569 return log_error_errno(r, "Failed to parse capability %s.", t); 584 log_error("Failed to parse capability %s.", t); 1558 uint64_t capability; member in struct:__anon218 [all...] |
/systemd/src/core/ |
H A D | dbus-unit.c | 416 int capability, 433 return bus_verify_polkit_async(call, capability, "org.freedesktop.systemd1.manage-units", details, false, UID_INVALID, &u->manager->polkit_registry, error); 413 bus_verify_manage_units_async_full( Unit *u, const char *verb, int capability, const char *polkit_message, sd_bus_message *call, sd_bus_error *error) argument
|
/systemd/src/network/ |
H A D | networkctl.c | 770 char *capability; local 887 capability = t; 892 return capability; 900 uint32_t capability; local 985 sscanf(b, "%x", &capability); 987 cap = lldp_system_caps(capability);
|
/systemd/src/udev/cdrom_id/ |
H A D | cdrom_id.c | 224 int capability; local 226 capability = ioctl(fd, CDROM_GET_CAPABILITY, NULL); 227 if (capability < 0) { 232 if (capability & CDC_CD_R) 234 if (capability & CDC_CD_RW) 236 if (capability & CDC_DVD) 238 if (capability & CDC_DVD_R) 240 if (capability & CDC_DVD_RAM) 242 if (capability & CDC_MRW) 244 if (capability [all...] |
/systemd/src/shared/ |
H A D | bus-util.c | 249 int capability, 267 r = sd_bus_query_sender_privilege(call, capability); 407 int capability, 474 r = sd_bus_query_sender_privilege(call, capability); 247 bus_test_polkit( sd_bus_message *call, int capability, const char *action, const char **details, uid_t good_user, bool *_challenge, sd_bus_error *e) argument 405 bus_verify_polkit_async( sd_bus_message *call, int capability, const char *action, const char **details, bool interactive, uid_t good_user, Hashmap **registry, sd_bus_error *error) argument
|